Introduction to DBMS
Here is the list of all the Solution:
UNITS -I(Hand-written Notes)
|
|
Characteristics of the database approach, data models
|
VIEW
|
DBMS architecture and data independence
|
VIEW
|
|
|
UNITS -II(Hand-written Notes)
|
|
E-R Modeling
|
VIEW
|
Entity types, Entity sets, attribute, and key
|
VIEW
|
relationships, relation types
|
VIEW
|
roles and structural constraints
|
VIEW
|
weak entities enhanced E-R and object modeling
|
VIEW
|
Subclasses; Superclasses
|
VIEW
|
inheritance, specialization, and generalization
|
VIEW
|
|
|
UNITS -III(Hand-written Notes)
|
|
File Organization
|
VIEW
|
Indexed sequential access files
|
VIEW
|
implementation using B & B++ trees
|
VIEW
|
hashing, hashing functions
|
VIEW
|
collision resolution, extendible hashing
|
VIEW
|
dynamic hashing approach implementation
and performance
|
VIEW
|
|
|
UNITS -IV(Hand-written Notes)
|
|
Relational Data Model:
|
VIEW
|
Relational model concepts
|
VIEW
|
relational constraints, relational algebra
|
VIEW
|
SQL: SQL queries
|
VIEW
|
programming using SQL
|
VIEW
|
|
|
UNITS -V(Hand-written Notes)
|
|
EER and ER to relational mapping
|
VIEW
|
Database design using EER to relational language
|
VIEW
|
|
|
UNITS -VI(Hand-written Notes)
|
|
Data Normalization
|
VIEW
|
Functional Dependencies
|
VIEW
|
Normal form up to 3rd normal form
|
VIEW
|
Concurrency Control
|
VIEW
|
Transaction processing, locking techniques
|
VIEW
|
associated, database recovery
|
VIEW
|
security and authorization
|
VIEW
|
Recovery Techniques, Database Security
|
VIEW
|
|
|
|
कोई टिप्पणी नहीं:
एक टिप्पणी भेजें